#
8be5cabc |
| 03-Aug-2017 |
ozaki-r <ozaki-r@NetBSD.org> |
Introduce KEY_SA_UNREF and replace KEY_FREESAV with it where sav will never be actually freed in the future
KEY_SA_UNREF is still key_freesav so no functional change for now.
This change reduces di
Introduce KEY_SA_UNREF and replace KEY_FREESAV with it where sav will never be actually freed in the future
KEY_SA_UNREF is still key_freesav so no functional change for now.
This change reduces diff of further changes.
show more ...
|
#
4ce45a79 |
| 02-Jun-2017 |
ozaki-r <ozaki-r@NetBSD.org> |
Assert inph_locked on ipsec_pcb_skip_ipsec (was IPSEC_PCB_SKIP_IPSEC)
The assertion confirms SP caches are accessed under inph lock (solock).
|
#
2495e7a0 |
| 03-Mar-2017 |
ozaki-r <ozaki-r@NetBSD.org> |
Pass inpcb/in6pcb instead of socket to ip_output/ip6_output
- Passing a socket to Layer 3 is layer violation and even unnecessary - The change makes codes of callers and IPsec a bit simple
|
#
68f5a347 |
| 04-Jan-2017 |
martin <martin@NetBSD.org> |
Fix optlen calculation for the SACK block - 2 bytes too few were calculated, causing corruption in PR kern/51767.
|
#
c6fa5aa9 |
| 04-Jan-2017 |
kre <kre@NetBSD.org> |
Remove redundant tests: if optlen === 0, then optlen % 4 != 2 (it is 0) so there is no need to test both.
|
#
106cdf03 |
| 03-Jan-2017 |
christos <christos@NetBSD.org> |
use symbolic constants; no functional change.
|
#
0a91c122 |
| 03-Jan-2017 |
christos <christos@NetBSD.org> |
put it the way we had it before; since we check for the resulting size after we added the extra space we can be equal to the size of the buffer.
|
#
9a6f404c |
| 03-Jan-2017 |
christos <christos@NetBSD.org> |
fix off-by-one
|
#
5e3bbad5 |
| 02-Jan-2017 |
christos <christos@NetBSD.org> |
make sure that the reset label is defined without TCP_SIGNATURE.
|
#
65dfd4cc |
| 02-Jan-2017 |
christos <christos@NetBSD.org> |
Fix TCP signature code: 1. pack options more tightly instead of being generous with no/op 2. put TCP_SIGNATURE option before SACK 3. fix computation of options length, by deferring it XXX: Really we
Fix TCP signature code: 1. pack options more tightly instead of being generous with no/op 2. put TCP_SIGNATURE option before SACK 3. fix computation of options length, by deferring it XXX: Really we should move the options setting code in one place instead of having two copies one for input and one for output. XXX: tcp_optlen/tcp_hdrsiz need to be fixed; they were wrong before too.
show more ...
|
#
4c25fb2f |
| 08-Dec-2016 |
ozaki-r <ozaki-r@NetBSD.org> |
Add rtcache_unref to release points of rtentry stemming from rtcache
In the MP-safe world, a rtentry stemming from a rtcache can be freed at any points. So we need to protect rtentries somehow say b
Add rtcache_unref to release points of rtentry stemming from rtcache
In the MP-safe world, a rtentry stemming from a rtcache can be freed at any points. So we need to protect rtentries somehow say by reference couting or passive references. Regardless of the method, we need to call some release function of a rtentry after using it.
The change adds a new function rtcache_unref to release a rtentry. At this point, this function does nothing because for now we don't add a reference to a rtentry when we get one from a rtcache. We will add something useful in a further commit.
This change is a part of changes for MP-safe routing table. It is separated to avoid one big change that makes difficult to debug by bisecting.
show more ...
|
#
d938d837 |
| 10-Jun-2016 |
ozaki-r <ozaki-r@NetBSD.org> |
Introduce m_set_rcvif and m_reset_rcvif
The API is used to set (or reset) a received interface of a mbuf. They are counterpart of m_get_rcvif, which will come in another commit, hide internal of rcv
Introduce m_set_rcvif and m_reset_rcvif
The API is used to set (or reset) a received interface of a mbuf. They are counterpart of m_get_rcvif, which will come in another commit, hide internal of rcvif operation, and reduce the diff of the upcoming change.
No functional change.
show more ...
|
#
1c4a50f1 |
| 24-Aug-2015 |
pooka <pooka@NetBSD.org> |
sprinkle _KERNEL_OPT
|
#
49cb8763 |
| 24-Jul-2015 |
matt <matt@NetBSD.org> |
If we are sending a window probe and there's unacked data in the socket, make sure at least the persist timer is running.
|
#
a6fab821 |
| 16-May-2015 |
kefren <kefren@NetBSD.org> |
Don't put segment on the wire if security request can't be fulfilled
|
#
ffe2b84e |
| 27-Apr-2015 |
christos <christos@NetBSD.org> |
Apply Revision 220794 from FreeBSD to avoid dup ACKs:
When checking to see if a window update should be sent to the remote peer, don't force a window update if the window would not actually grow due
Apply Revision 220794 from FreeBSD to avoid dup ACKs:
When checking to see if a window update should be sent to the remote peer, don't force a window update if the window would not actually grow due to window scaling. Specifically, if the window scaling factor is larger than 2 * MSS, then after the local reader has drained 2 * MSS bytes from the socket, a window update can end up advertising the same window. If this happens, the supposed window update actually ends up being a duplicate ACK. This can result in an excessive number of duplicate ACKs when using a higher maximum socket buffer size.
Pointed out by Ricky Charlet, in tech-net.
show more ...
|
#
2373b55a |
| 27-Apr-2015 |
ozaki-r <ozaki-r@NetBSD.org> |
Introduce in6_selecthlim_rt to consolidate an idiom for rt->rt_ifp
It consolidates a scattered routine: (rt = rtcache_validate(&in6p->in6p_route)) != NULL ? rt->rt_ifp : NULL
|
#
1d14d022 |
| 14-Feb-2015 |
he <he@NetBSD.org> |
Port over the TCP_INFO socket option from FreeBSD, originally from the Linux 2.6 TCP API. This permits the caller to query certain information about a TCP connection, and is used by pkgsrc's net/ipe
Port over the TCP_INFO socket option from FreeBSD, originally from the Linux 2.6 TCP API. This permits the caller to query certain information about a TCP connection, and is used by pkgsrc's net/iperf3 test program if available.
This extends struct tcbcb with three fields to count retransmits, out-of-sequence receives and zero window announcements, and will therefore warrant a kernel revision bump (done separately).
show more ...
|
#
fcc99ce6 |
| 10-Nov-2014 |
maxv <maxv@NetBSD.org> |
Do not uselessly include <sys/malloc.h>.
|
#
828d2742 |
| 25-Oct-2014 |
christos <christos@NetBSD.org> |
Avoid stack overflow when SACK and TCP_SIGNATURE are both present. Thanks to Jonathan Looney for pointing this out.
|
#
62fa1e32 |
| 21-Oct-2014 |
hikaru <hikaru@NetBSD.org> |
Fix wrong condition checking TSO capability. ipsec_used is not necessary condition. IPsec outbound policy will not be checked when ipsec_used is false.
|
#
5d61e6c0 |
| 30-May-2014 |
christos <christos@NetBSD.org> |
Introduce 2 new variables: ipsec_enabled and ipsec_used. Ipsec enabled is controlled by sysctl and determines if is allowed. ipsec_used is set automatically based on ipsec being enabled, and rules ex
Introduce 2 new variables: ipsec_enabled and ipsec_used. Ipsec enabled is controlled by sysctl and determines if is allowed. ipsec_used is set automatically based on ipsec being enabled, and rules existing.
show more ...
|
#
27fe772d |
| 05-Jun-2013 |
christos <christos@NetBSD.org> |
IPSEC has not come in two speeds for a long time now (IPSEC == kame, FAST_IPSEC). Make everything refer to IPSEC to avoid confusion.
|
#
364a06bb |
| 22-Mar-2012 |
drochner <drochner@NetBSD.org> |
remove KAME IPSEC, replaced by FAST_IPSEC
|
#
42c42085 |
| 31-Dec-2011 |
christos <christos@NetBSD.org> |
- fix offsetof usage, and redundant defines - kill pointer casts to 0
|